Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
31-05-2024 02:52
Static task
static1
Behavioral task
behavioral1
Sample
85c880b317eb7b16862e724ccebee346_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
85c880b317eb7b16862e724ccebee346_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
85c880b317eb7b16862e724ccebee346_JaffaCakes118.html
-
Size
53KB
-
MD5
85c880b317eb7b16862e724ccebee346
-
SHA1
af07c0ba576a85d027f60a28810ea03376a84bd9
-
SHA256
86f26cb8af09a856e70d5b0791d6e6bc5ee0cffab11e4d0d0407109d3fd27ca9
-
SHA512
99297772234da2e3cb928988b153645a326d2afa4bf9e7134814059dd685bcb5fbbc234d5cb7d851c768386a3d9324749318838f9f2e2f05c5bbad386cda3bcc
-
SSDEEP
1536:XEijZeqLAEijZeqLGcqrsVdk1koVpk/6bWv:XEijZeqLAEijZeqL9qsVdZoVW6bWv
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4404 msedge.exe 4404 msedge.exe 4200 msedge.exe 4200 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4200 wrote to memory of 4292 4200 msedge.exe 83 PID 4200 wrote to memory of 4292 4200 msedge.exe 83 PID 4200 wrote to memory of 4600 4200 msedge.exe 84 PID 4200 wrote to memory of 4600 4200 msedge.exe 84 PID 4200 wrote to memory of 4600 4200 msedge.exe 84 PID 4200 wrote to memory of 4600 4200 msedge.exe 84 PID 4200 wrote to memory of 4600 4200 msedge.exe 84 PID 4200 wrote to memory of 4600 4200 msedge.exe 84 PID 4200 wrote to memory of 4600 4200 msedge.exe 84 PID 4200 wrote to memory of 4600 4200 msedge.exe 84 PID 4200 wrote to memory of 4600 4200 msedge.exe 84 PID 4200 wrote to memory of 4600 4200 msedge.exe 84 PID 4200 wrote to memory of 4600 4200 msedge.exe 84 PID 4200 wrote to memory of 4600 4200 msedge.exe 84 PID 4200 wrote to memory of 4600 4200 msedge.exe 84 PID 4200 wrote to memory of 4600 4200 msedge.exe 84 PID 4200 wrote to memory of 4600 4200 msedge.exe 84 PID 4200 wrote to memory of 4600 4200 msedge.exe 84 PID 4200 wrote to memory of 4600 4200 msedge.exe 84 PID 4200 wrote to memory of 4600 4200 msedge.exe 84 PID 4200 wrote to memory of 4600 4200 msedge.exe 84 PID 4200 wrote to memory of 4600 4200 msedge.exe 84 PID 4200 wrote to memory of 4600 4200 msedge.exe 84 PID 4200 wrote to memory of 4600 4200 msedge.exe 84 PID 4200 wrote to memory of 4600 4200 msedge.exe 84 PID 4200 wrote to memory of 4600 4200 msedge.exe 84 PID 4200 wrote to memory of 4600 4200 msedge.exe 84 PID 4200 wrote to memory of 4600 4200 msedge.exe 84 PID 4200 wrote to memory of 4600 4200 msedge.exe 84 PID 4200 wrote to memory of 4600 4200 msedge.exe 84 PID 4200 wrote to memory of 4600 4200 msedge.exe 84 PID 4200 wrote to memory of 4600 4200 msedge.exe 84 PID 4200 wrote to memory of 4600 4200 msedge.exe 84 PID 4200 wrote to memory of 4600 4200 msedge.exe 84 PID 4200 wrote to memory of 4600 4200 msedge.exe 84 PID 4200 wrote to memory of 4600 4200 msedge.exe 84 PID 4200 wrote to memory of 4600 4200 msedge.exe 84 PID 4200 wrote to memory of 4600 4200 msedge.exe 84 PID 4200 wrote to memory of 4600 4200 msedge.exe 84 PID 4200 wrote to memory of 4600 4200 msedge.exe 84 PID 4200 wrote to memory of 4600 4200 msedge.exe 84 PID 4200 wrote to memory of 4600 4200 msedge.exe 84 PID 4200 wrote to memory of 4404 4200 msedge.exe 85 PID 4200 wrote to memory of 4404 4200 msedge.exe 85 PID 4200 wrote to memory of 4780 4200 msedge.exe 86 PID 4200 wrote to memory of 4780 4200 msedge.exe 86 PID 4200 wrote to memory of 4780 4200 msedge.exe 86 PID 4200 wrote to memory of 4780 4200 msedge.exe 86 PID 4200 wrote to memory of 4780 4200 msedge.exe 86 PID 4200 wrote to memory of 4780 4200 msedge.exe 86 PID 4200 wrote to memory of 4780 4200 msedge.exe 86 PID 4200 wrote to memory of 4780 4200 msedge.exe 86 PID 4200 wrote to memory of 4780 4200 msedge.exe 86 PID 4200 wrote to memory of 4780 4200 msedge.exe 86 PID 4200 wrote to memory of 4780 4200 msedge.exe 86 PID 4200 wrote to memory of 4780 4200 msedge.exe 86 PID 4200 wrote to memory of 4780 4200 msedge.exe 86 PID 4200 wrote to memory of 4780 4200 msedge.exe 86 PID 4200 wrote to memory of 4780 4200 msedge.exe 86 PID 4200 wrote to memory of 4780 4200 msedge.exe 86 PID 4200 wrote to memory of 4780 4200 msedge.exe 86 PID 4200 wrote to memory of 4780 4200 msedge.exe 86 PID 4200 wrote to memory of 4780 4200 msedge.exe 86 PID 4200 wrote to memory of 4780 4200 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\85c880b317eb7b16862e724ccebee346_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4200 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff90ff846f8,0x7ff90ff84708,0x7ff90ff847182⤵PID:4292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2280,6156243385636178660,12254288184144908896,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2292 /prefetch:22⤵PID:4600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2280,6156243385636178660,12254288184144908896,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2344 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2280,6156243385636178660,12254288184144908896,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2824 /prefetch:82⤵PID:4780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2280,6156243385636178660,12254288184144908896,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:3188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2280,6156243385636178660,12254288184144908896,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:1812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2280,6156243385636178660,12254288184144908896,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4784 /prefetch:12⤵PID:4004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2280,6156243385636178660,12254288184144908896,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6116 /prefetch:12⤵PID:1760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2280,6156243385636178660,12254288184144908896,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5856 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1080
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5008
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3044
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD519481c76f2390117d50fbfbd996c6590
SHA11058ef1a5968682d26ceb2b2db38a2e723c8db8a
SHA256e33561a33cdd8b065c3709ecddac9d6cfed9cf4279a19d9aba1718610c80f6af
SHA5127c7b43fdfc3e880dc13d69e1489d088aa19d909210f34dd4bb911a48a165000f50602e16dbc3256e7aa6ebb0c377bc8f9cfaf79b3d726ff36f361c24388ff319
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5def5a211803baa1673fbc2aa7a1adca9
SHA1f61c38884c645e848144f19287f4d277b2b97e40
SHA256deb5b974437b1aa3701c7ea5388464636877eb42262c9e25423ebdce46dbbbe2
SHA51271146023cb19654a2c9148b2dc89025f9be3100e442d23eed1d288c9d0f913e943905dc7bb61d976ff5da6ff3decdca3384d92542b101da1248a2660ac11ab30
-
Filesize
1KB
MD5127056085e2cb59336e8c9c00ab98129
SHA188aec5606fef120e1ef6227ff3e65af1703450b1
SHA25663f2fcf06deb1c3a6d6c49ab528dbb6af78d58d07df2f22f86ace3a95dc0f4f7
SHA5129287b4414b511bf432010a1350d14e3dbd79ff1622daf449ba68d895d5e0e5054fa29a93b277d36967e338761e418a4d1d08df9cd80a2b5069c31c6590064db3
-
Filesize
5KB
MD54a795e7dbe9c7220f1460ae1cc6e08f9
SHA16c78fbff8b3cb0bfcf8f39b7f43badf4d96da68e
SHA25685c1e5fd5f2ee8cd2caf3dfeb871a9b0d3cec5886d1b142f5e7b9f53cf8040e4
SHA512d27478f9449375c0fc0d58275292a28b58ae628bf266cc63fb6456a860288c52baa50f86f77ce84dd661cf42dff9048a8d3b628bcbfd2924f81750ea843daa47
-
Filesize
6KB
MD59daef1822fe39b755211c28d630431ff
SHA1c7b5549d5b037d4190b5b7acf20d4619eb200e4b
SHA2568471fa9439613ac642073b8492ba766873882947d8e0a5c70e6f15899d491105
SHA51206ffa75d88fe2f584d498737bd04f007f73790b761a249f16081e686ea690afff5410fab3397092a32cc97692eaba65f25e3bc25ac66e60d9820dc78c621fa18
-
Filesize
10KB
MD59b4c25f26575165a7f11377fcd2ff369
SHA1897ac90f483dca18b25665457b04d3455c847351
SHA25641ae2b5abc126927ee7abd06b85b38a300fbc9b382be241023a08c1e6ca41aec
SHA51227790b79204262ffba6d74c1a86b66af6e4e53304a30849bda4aa79162c66ef13e79bce28f7a73344e5114b795ae2fafc78255e5b053a4e15a1f8b7a1c47e76b